R32 — OT / ICS Compromise
Attackers pivot from IT into OT/ICS networks (PLCs, SCADA, building-management, medical devices) where patching is hard and uptime is sacred. Detection-heavy because most OT equipment cannot run agents; segmentation + monitored conduits are the dominant control. Residual is high because legacy protocols (Modbus, DNP3) lack authentication by design. Material mainly when techProfile is Manufacturing, Healthcare, or Government.
What is OT / ICS Compromise?
Attackers pivot from IT into OT/ICS networks (PLCs, SCADA, building-management, medical devices) where patching is hard and uptime is sacred. Detection-heavy because most OT equipment cannot run agents; segmentation + monitored conduits are the dominant control. Residual is high because legacy protocols (Modbus, DNP3) lack authentication by design. Material mainly when techProfile is Manufacturing, Healthcare, or Government. CISO Game tracks this as R32 in the live risk register, severity 9 (Catastrophic), category Operational.
How does CISO Game model OT / ICS Compromise?
Exposure for R32 runs from 0 to 100, recomputed live as you buy, cancel, or reassign products. How the exposure model works →
Real-world parallel
OT/ICS compromise is the risk category that turns cybersecurity into kinetic-impact territory. Manufacturing, utilities, healthcare imaging, and physical-security systems all sit in this domain. Air-gap discipline + protocol-aware monitoring (Claroty, Dragos, Nozomi-class tooling) are the operational levers; the strategic question is whether IT and OT teams report into the same accountability structure.
How do security teams mitigate OT / ICS Compromise?
The dominant subscore levers for this risk are:
- Detection subscore — weight 30%
- Prevention subscore — weight 30%
- Response subscore — weight 15%
- Recovery subscore — weight 10%
Residual offset: +15 exposure points are structural — no product fully removes them. Real-world parallels: zero-day windows, vendor monoculture, regulator unpredictability.
Sector-specific: only material when the company's tech profile is one of: Manufacturing, Healthcare, Government.
Which investments mitigate OT / ICS Compromise?
Products in CISO Game that reduce exposure to R32:
- Enterprise SIEM (heavy/full-featured)SIEM
- Network Detection & Response (NDR)Network
- Intrusion Prevention System (IPS)Network
- MSSP — managed 24/7Services
- Threat intelligence feedServices
- Network segmentation (3 quarters)Architecture
- Hire Network EngineerHeadcount
- IEC 62443 OT-Security programCompliance
Which related risks should you also watch?
Risks with similar dominant subscores or shared category — addressing one often helps the others:
- R06 Supply Chain CompromiseExternal · severity 9
- R07 Zero-Day ExploitationExternal · severity 9
- R09 Insider ThreatInsider · severity 8
- R11 Lateral MovementInsider · severity 8
Why does OT / ICS Compromise matter to a CISO?
Operational risk crosses IT/OT boundaries. OT / ICS Compromise is shaped by architecture, recovery readiness, and how mature the company's incident-response muscle is.
How can you test your mitigation strategy?
Click Play CISO Game free to see R32 appear live in your risk register and watch each purchase move the exposure number in real time. No signup required.
Stress-test OT / ICS Compromise in the Standard run scenario →